Search

Category: Security

The countdown is on! The Rochester Security Summit is 26 days away, and this is the first edition of Rochester Security Summit Thursday. Every Thursday until the event, we’d like to give you a bit of what conference attendees will experience. First, let’s talk about the theme of this year’s event. The theme of this…

We’ve all made the mistake. The dreaded “Reply All” button response that was meant for one person but sent to the entire office. Mistakes happen and a small one like that is nothing to fret over, other than the potential awkward conversation in the hallway. Of course, there’s always the bigger mistake. Sharing sensitive company…

Getting your education takes a long time. Securing a home loan tends to be a longer process, as well. Both make sense and are commonly referred to as “the way it is.” What doesn’t make sense is the information that was revealed in NopSec’s 2015 State of Vulnerability Risk Management. Summed up: Remediation issues are…

You’re an advertising agency. You’re a manufacturing plant. You’re a hospital. Every day you go to work, you want to do work in the fields you’ve selected because that’s what you’re passionate about and it’s what you’re good at. For this reason, many companies are moving away from simple service level agreements to deeper-level, more…

It’s 6 a.m. and Meredith is trying to catch up on some emails at the office before the throng of calls and meetings for the day begin. While in the middle of a response to an employee’s question at a customer location, her email crashes. Frustrated she restarts her mail program and sets about emailing said…

When managing privileged accounts on your network there is a particular feeling that you want to avoid. You, and your information security team, should never feel like a game of hide-and-seek has broken out. On average, there are three to four times more shared and privileged accounts than employees in an organization. So while you’re…

Homer Simpson’s catch phrase is one, simple word: D’oh! And no better word could sum up how we’re feeling after reading SplashData’s annual list of worst passwords of the year. In fact, if people were smart enough to use D’oh as their password, it’d be more secure than about 99% of 2014’s worst. Most alarming,…

IT organizations struggle to answer fundamental questions about their data centers like “What assets do I have, and how are they connected?” and “Where are they located, and how are they being used?” Manual data collection methods cannot keep pace with today’s complex and dynamic IT environments. The result? Unreliable data and too much guesswork…

Today, mobile devices come in all shapes and sizes, from smartphones, notebooks and tablets, to the new Smartwatch. While this mobility boosts efficiency through “anywhere, anytime access” to business systems it creates an equal amount of uncertainty and vulnerability for the organization. With 81% of employees currently using personal devices at work, security managers have…